Now showing items 1-13 of 13

    • Architecture framework for software safety 

      Gürbüz H.G.; Pala Er, N.; Tekinerdogan, B. (Springer Verlag, 2014)
      Currently, an increasing number of systems are controlled by soft- ware and rely on the correct operation of software. In this context, a safety- critical system is defined as a system in which malfunctioning software could ...
    • Capture resilient ElGamal signature protocols 

      Acan, H.; Kaya, K.; Selçuk, A. A. (Springer Verlag, 2006)
      One of the fundamental problems of public key cryptography is protecting the private key. Private keys are too long to be remembered by the user, and storing them in the device which performs the private key operation is ...
    • Communication scheme by using synchronized chaotic systems 

      morgül, Ö.; Feki, M. (IEEE, Piscataway, NJ, United States, 1996)
      A method to synchronize systems with chaotic behavior, in a master-slave configuration adapted to communication systems, is discussed. This work is motivated by the need for secure communication. In this method, the ...
    • Differential entropy analysis of the IDEA block cipher 

      Biryukov, A.; Nakahara, Jr. J.; Yıldırım H. M. (Elsevier, 2014)
      This paper describes a new cryptanalytic technique that combines differential cryptanalysis with Shannon entropy. We call it differential entropy (DE). The objective is to exploit the non-uniform distribution of output ...
    • G-free: Defeating return-oriented programming through gadget-less binaries 

      Onarlioglu, K.; Bilge, L.; Lanzi, A.; Balzarotti, D.; Kirda, E. (I E E E Computer Society, 2010)
      Despite the numerous prevention and protection mechanisms that have been introduced into modern operating systems, the exploitation of memory corruption vulnerabilities still represents a serious threat to the security of ...
    • Imaging capability of pseudomorphic high electron mobility transistors, AlGaN/GaN, and Si micro-Hall probes for scanning Hall probe microscopy between 25 and 125 °c 

      Akram, R.; Dede, M.; Oral, A. (American Vacuum Society, 2009)
      The authors present a comparative study on imaging capabilities of three different micro-Hall probe sensors fabricated from narrow and wide band gap semiconductors for scanning hall probe microscopy at variable temperatures. ...
    • Improved DST cryptanalysis of IDEA 

      Ayaz, E. S.; Selçuk, A. A. (Springer, 2007)
      In this paper, we show how the Demirci-Selcuk-Ture attack, which is currently the deepest penetrating attack on the IDEA block cipher, can be improved significantly in performance. The improvements presented reduce the ...
    • Modeling urbanization using building patterns 

      Doǧrusöz, E.; Aksoy, S. (2007)
      Automatic extraction of buildings and modeling of their spatial arrangements provide essential information for urban applications. This paper describes our work on modeling urbanization using spatial building patterns. ...
    • Online balancing two independent criteria 

      Tse, S.S.H. (2008)
      We study the online bicriteria load balancing problem in this paper. We choose a system of distributed homogeneous file servers located in a cluster as the scenario and propose two online approximate algorithms for balancing ...
    • Online bicriteria load balancing using object reallocation 

      Tse, S. S. H. (Institute of Electrical and Electronics Engineers, 2009-03)
      We study the bicriteria load balancing problem on two independent parameters under the allowance of object reallocation. The scenario is a system of $M$ distributed file servers located in a cluster, and we propose three ...
    • A scratch-pad memory aware dynamic loop scheduling algorithm 

      Ozturk O.; Kandemir, M.; Narayanan, S.H.K. (2008)
      Executing array based applications on a chip multiprocessor requires effective loop parallelization techniques. One of the critical issues that need to be tackled by an optimizing compiler in this context is loop scheduling, ...
    • A strong user authentication protocol for GSM 

      Aydemir Ö.; Selçuk, A.A. (2005)
      Traditionally, the authentication protocols for cellular phone networks have been designed for device authentication rather than user authentication, which brings certain limitations and restrictions on the functionality ...
    • A survey on information security threats and solutions for Machine to Machine (M2M) communications 

      Tuna, G.; Kogias, D. G.; Gungor, V. C.; Gezer, C.; Taşkın, E.; Ayday, E. (Academic Press Inc., 2017)
      Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, ...